Next Article in Journal
Analytical Gate Delay Variation Model with Temperature Effects in Near-Threshold Region Based on Log-Skew-Normal Distribution
Previous Article in Journal
Localization and Frequency Identification of Large-Range Wide-Band Electromagnetic Interference Sources in Electromagnetic Imaging System
Previous Article in Special Issue
Forecasting Heating Consumption in Buildings: A Scalable Full-Stack Distributed Engine
Article Menu

Export Article

Open AccessArticle

Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices

1
Laboratory of Computer Security Problems, The Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS), 39, 14 Liniya, 199178 St. Petersburg, Russia
2
International Laboratory of Information Security of Cyber-physical Systems, The Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University), 49, Kronverksky Prospect, 197101 St. Petersburg, Russia
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(5), 500; https://doi.org/10.3390/electronics8050500
Received: 11 March 2019 / Revised: 26 April 2019 / Accepted: 5 May 2019 / Published: 6 May 2019
(This article belongs to the Special Issue Cyber-Physical Systems)
  |  
PDF [1535 KB, uploaded 6 May 2019]
  |  

Abstract

Currently, energy resource exhaustion attacks targeted on modern autonomously working mobile devices are becoming more and more important. The underdevelopment of specialized defenses against energy exhaustion attacks as well as their often hidden nature for the owner of the target device determine a necessity of an integrated approach to modeling and evaluation of this class of attacks and various types of intruders. The paper analyzes conditions of applicability of energy resource exhaustion attacks performed by various classes of intruders, models them on physical implementations of devices for two application areas, and calculates their performance indicators. Application areas are a TCP/IP network of end-user mobile devices and a self-organizing mesh network designed for operational management and emergency response. View Full-Text
Keywords: cyber-physical security; energy exhaustion attacks; denial-of-sleep; modeling and simulation cyber-physical security; energy exhaustion attacks; denial-of-sleep; modeling and simulation
Figures

Graphical abstract

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Desnitsky, V.; Kotenko, I.; Zakoldaev, D. Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices. Electronics 2019, 8, 500.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Electronics EISSN 2079-9292 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top